+ All Categories
Home > Documents > Rajant Kinetic Mesh® Security Is on the Front Line in the ...rajant.com ›...

Rajant Kinetic Mesh® Security Is on the Front Line in the ...rajant.com ›...

Date post: 03-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
5
Rajant Kinetic Mesh® Security Is on the Front Line in the Cyber War to Protect Your Sensitive Communications
Transcript
Page 1: Rajant Kinetic Mesh® Security Is on the Front Line in the ...rajant.com › wp...Security-Front-Line-Whitepaper.pdffor indoor settings. Rajant’s private wireless Kinetic Mesh network

1White Paper: Rajant Kinetic Mesh® Security Is on the Front Line in the Cyber War to Protect Your Sensitive Communications

Rajant Kinetic Mesh® Security Is on the Front Line in the Cyber War to Protect Your Sensitive Communications

Page 2: Rajant Kinetic Mesh® Security Is on the Front Line in the ...rajant.com › wp...Security-Front-Line-Whitepaper.pdffor indoor settings. Rajant’s private wireless Kinetic Mesh network

2White Paper: Rajant Kinetic Mesh® Security Is on the Front Line in the Cyber War to Protect Your Sensitive Communications

The use of technology is growing exponentially in virtually every segment of the industrial marketplace, including mining, oil and gas, agriculture, transportation, heavy construction, military, municipalities, and government.

Today’s industrial organizations have made, and continue to make, substantial capital investments in equipment and vehicle automation, Supervisory Control and Data Acquisition (SCADA), process control systems (PCS), and communications infrastructure to increase productivity, control costs, and streamline delivery of products and services.

As a result, operations and assets are becoming increasingly interconnected. Massive amounts of data are being processed and stored electronically. Autonomy, the Internet of Things (IoT), and machine-to-machine (M2M) communications are generating volumes of critical information, and personnel are accessing applications and data wherever and whenever needed.

Knowing how absolutely essential security is, this white paper explores how Rajant has made significant investments in providing multi-level, robust security to protect your Kinetic Mesh network traffic, even as network topologies evolve.

Introduction

Wi-Fi, LTE, and

point-to-multipoint

(PtMP) networks are all inherently fixed systems that were initially constructued for indoor settings.

Rajant’s private

wireless Kinetic

Mesh network

was built from the ground up to connect rugged, outdoor, industrial, highly mobile environments.

Page 3: Rajant Kinetic Mesh® Security Is on the Front Line in the ...rajant.com › wp...Security-Front-Line-Whitepaper.pdffor indoor settings. Rajant’s private wireless Kinetic Mesh network

3White Paper: Rajant Kinetic Mesh® Security Is on the Front Line in the Cyber War to Protect Your Sensitive Communications

Information technology is truly a strategic business

asset. Information systems have helped industrial

enterprises implement more efficient, agile, and

profitable business practices. However, they have

also left their information systems vulnerable to

persistent, well-organized, and constantly-evolving

cyber attacks. Consequently, industrial organizations

have had to strengthen security measures to protect

against and respond to potential threats. Today’s

highly-targeted, difficult to detect, and dynamic cyber

attacks can cause serious communication outages,

Information Technology More Benefits, More Risks

RajantYour Partner in the Cyber War

damage physical assets, threaten personnel and

customer safety, damage an organization’s brand,

erode customer confidence, and violate compliance

directives. Depending on the size of the organization,

the financial impact alone can reach millions of dollars,

leading many organizations to make the cyber war

a top priority. While there is no defense method

or system that can guarantee absolute security,

implementing best-in-class security solutions is critical

to detect and defeat attacks and safeguard people,

data, and operations.

At Rajant, we know how absolutely essential security

is. So, we have made significant investments in

providing multi-level, robust security to protect

your Kinetic Mesh network traffic, even as network

topologies evolve. As you add, move, or remove

nodes, your mesh network automatically adapts to

the changes in real time, while keeping the network

available and secure. Rajant BreadCrumb® wireless

nodes powered by our patented1 InstaMesh®

networking protocol offer several firmware-embedded

security features, including data and MAC address

encryption as well as per-hop and per-packet

authentication. Securing your mesh network traffic is

accomplished by specifying the security features that

fit your organization’s information security strategy.

All security features can be easily configured and

managed using BC|Commander® management

and monitoring software, which is included with

BreadCrumb nodes. In addition, BreadCrumb

security features will integrate with the network

security systems residing on your non-Rajant network

infrastructure.

Page 4: Rajant Kinetic Mesh® Security Is on the Front Line in the ...rajant.com › wp...Security-Front-Line-Whitepaper.pdffor indoor settings. Rajant’s private wireless Kinetic Mesh network

4White Paper: Rajant Kinetic Mesh® Security Is on the Front Line in the Cyber War to Protect Your Sensitive Communications

The first layer of security is a cryptographic handshake

that always occurs whenever two BreadCrumb nodes

establish a connection with one another, regardless of

any other security settings. To protect from malicious

activities, this function cannot be disabled. If nodes do

not share the same cryptographic settings, they will not

mesh. If you have a mine, you will deploy maybe one

or two base stations at that mine.

The number depends on how big your mine is and

what physical barriers to RF are caused by the mine

layout, but if you look at the backhaul of that network,

it requires multiple fiber links across that site. Often that

fiber is hired or taken from one other external supplier.

If that fiber goes down, the network goes down, making

it a maintenance and availability scenario.

• Packet-Cipher: The packet cipher is used to encrypt all data as it flows between BreadCrumb nodes, providing privacy from wireless eavesdroppers. Encryption occurs on a per-packet basis when packets enter the mesh (encounter their first BreadCrumb node) and are decrypted when they leave the mesh. Several options are available, including 128/192/256-bit AES CTR (counter mode), 128/192/256-bit AES GCM (Galois/Counter Mode), and XSalsa-20.

• Per-Hop Authentication: To ensure that each data packet received is in its original, unmodified, and authorized state, per-hop authentication provides protection from packet injection, MAC spoofing, and replay attacks. You have several authentication options, including 128/192/256-bit AES GMAC (Galois Message Authentication Code) and HMAC- (hash-based message authentication code-) SHA 1/224/256/384/512.

• MAC Address Cipher: This cipher is used to encrypt the source and destination MAC (media access control) addresses of each packet that flows through the network. MAC encryption provides protection from traffic analysis, which could otherwise be used to identify the most important devices on the network in order to target attacks. All of the options available as a Packet Cipher (above) are also available here.

• Client Traffic Cipher: Wireless client traffic to and from BreadCrumb nodes can be secured via WEP (Wired Equivalent Privacy), WPA (Wireless Protected Access), WPA Enterprise (Remote Authentication Dial-In User Service or RADIUS), WPA2, and WPA2 Enterprise (RADIUS). Several Extensible Authentication Protocol (EAP) methods are supported for RADIUS as well as Counter Mode CBC-MAC Protocol (CCMP) and Temporal Key Integrity Protocol (TKIP) encryption.

• Access Control Lists (ACLs):MAC-address-based ACLs can be applied to Ethernet and radio interfaces to specify the users or system processes that are granted access to objects as well as the operations that are allowed on given objects. You can deny access to specific items such as email addresses, users, URLs, etc., with a blacklist. Conversely, you can create a whitelist and allow only those items that are included in the whitelist to access your network.

• Virtual Local Area Networks (VLANs): VLANs allow segmentation of multiple virtual networks on a single mesh and are configured on a per-port basis, where a port is a BreadCrumb node, one of its Ethernet interfaces, or a radio interface-ESSID combination. Clients with access to one set of VLANs cannot receive or send traffic to other VLANs even if they are on the same BreadCrumb mesh.

• Quality of Service (QoS): VLANs may have QoS settings applied to prioritize critical traffic. This can provide a security benefit in certain applications.

• Disabling Interfaces: In addition, unused Ethernet and Radio interfaces can be disabled remotely.

Powerful Cryptographic Options Adding the First Layer

All BreadCrumb® nodes are configured with 256-bit Advanced Encryption Standard (AES) using BC|Commander®.

Page 5: Rajant Kinetic Mesh® Security Is on the Front Line in the ...rajant.com › wp...Security-Front-Line-Whitepaper.pdffor indoor settings. Rajant’s private wireless Kinetic Mesh network

5White Paper: Rajant Kinetic Mesh® Security Is on the Front Line in the Cyber War to Protect Your Sensitive Communications

a

Learn why utilities, ports, mines, agriculture, and more industries rely on Rajant Kinetic Mesh networks for the continuous, fully mobile connectivity required to power today’s data-driven operations. Visit www.rajant.com or contact a representative to learn more. © Copyright 2019 Rajant Corporation. All rights reserved.

Tel: 484.595.0233 | www.rajant.com

If it’s moving, it’s Rajant.Industrial Wireless Networks Unleashed.

The global cyber war will continue as long as there are

bad guys who engage in seemingly relentless assaults

on the information systems that are so integral to the

success of industrial enterprises. Equally important to

providing you the best-in-class mesh is providing the

best-in-class security for that mesh. Our ongoing security

objective is to continue our persistent campaign against

malicious intruders to stop them from penetrating your

wireless mesh network and getting access to your

sensitive information. So, you have one less worry

when it comes to securing your information systems.

Securing Your Inter-Connected World

Additional security capabilities are provided

to protect communications beyond the mesh

network, including:

• Encrypted Firmware Updates: To protect the integrity of our firmware, updates are encrypted using 256-bit AES in CBC mode and cryptographically signed using a 4096-bit RSA key-pair. Non-Rajant firmware cannot be installed.

• Administrative Communications: BC|Commander administrative and management communications are secured using TLSv1 with an RSA or ECC key that is configurable and unique to each BreadCrumb.

• BreadCrumb Administration: All BreadCrumb configurations, passwords, and critical security parameters are remotely zeroizable via BC|Commander or via a button on the device with physical access to a BreadCrumb node. A zeroized BreadCrumb device cannot join a secured mesh network.

Security Beyond Network Traffic


Recommended